Professional Documents
Culture Documents
本人所呈交的毕业论文,是在导师的指导下,独立进行研究工作所取
得的成果所有数据、图片资料均真实可靠。除文中已经注明引用的内容外,
本论文不包含任何其他人或集体已经发表或撰写过的作品或成果。对本论
文的研究做出重要贡献的个人和集体,均已在文中以明确的方式标明。本
毕业论文的知识产权归属于培养单位。本人完全意识到本声明的法律结果
由本人承担。
本人签名: 日期:29 MAY/ 2022
毕业设计选题申报表
题目名称
Mobile Application for Child Monitoring and Control system
评审意见:
该选题符合要求!
指导教师
评审意见
指导教师签名:
年 月 日
评审意见:
分 院
评 审
意见
毕业论文(设计)指导委员会(主任)
签名:
年 月 日
云南工商学院
毕业设计任务书
题目名
Mobile Application for Child Monitoring and control System
称
班级名
Computer Science and Technology 分院名称 云南工商学院
称
□理论研究
题目来 □教师科研 □社会实践
题目类型 □应用研究
源 实验(实训)□其它
设计开发 □其它
This paper shows how parents may safeguard their children from internet side
effects using the Android application in a very particular sense. The major message of
选题背 this thesis is how to use technology to safeguard children from all forms of adverse
景及目 effects when they are online. The application has been planned and adjusted around these
的 issues so that guardians can effortlessly monitor their children remotely through the
Android working framework. This investigate will concentrate on smartphones, and in
specific the Android working system.
Carefully read the relevant references specified by the instructor, and understand the
author's writing ideas, research methods, and design ideas. Go to the library or search
for information on the Internet, clear the way to solve the problem, and find a solution.
工作任 [01] Wittes, B. Poplin, C. Jurecic, Q. and Spera, C. (2016) “Sextortion: Cybersecurity,
务及要 teenagers, and remote sexual assault”. Center for technology Innovation at Brookings.
[Online].Available:https://www.brookings.edu/wpcontent/uploads/2016/05/sextortion1
求
-1.pdf [accessed 8 October 2017]
[02] Willard, N. E. (2007). Cyber-safe kids, cyber-savvy teens: Helping young people
learn to use the Internet safely and responsibly. John Wiley & Sons.
1
[03] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.
[04] Sliverman, D. (2000). Analyzing talk and text. In Handbook of qualitative research.
Editors Denzin, N.K. and Lincoln, Y.S., 2nd edition, Sage Publications, California,
USA. pp. 821- 834.
[05] Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski,
I., & Stojmenovic, M. (2021). Keeping Children Safe Online With Limited Resources:
Analyzing what is Seen and Heard. IEEE Access, 9, 132723-132732
1、开题报告:2022 年 03 月 15 日
时间安 2、完成初稿:2022 年 04 月 18 日
排 3、完成终稿:2022 年 05 月 12 日
4、答 辩:2022 年 05 月 31 日
以上内容由指导教师填写
教师姓名: 审核意见:
指导教
师签 分院审核
字 分院院长(系主任)签字:
年 月 日 年 月 日
学生接
受任务 接受任务时间: 2022年 3 月 4 日 学生签名:
签字
2
云南工商学院
毕业设计开题报告
学院 智能科学与工程学院 专业及班级 Class 1 of 2018 CST
KAFI MD ISRAFIL 学
姓 名 18L55170016 指导教师 +8801302477978
MOMIN 号
一、选题的依据和意义,研究的主要问题,拟达到的目的:
Despite the many benefits of the Internet, children and adolescents - who are particularly vulnerable due
to their age - face many risks, including: inappropriate content, age-inappropriate content (such as
violent and sex websites) and illegal content. Online games, such as the Blue Whale Challenge,
have been used to persuade young adults to perform a series of "challenges." This research paper
uses Android operating system to solve such problems. With a single client server, parents will be
able to communicate with their children and control them with the help of smartphone's GPS
network. Arrangement for observing children with the assistance of GPS advances. The application
uses three fundamental administrations that are GPS, telephonic administrations, and cast screen.
For area administrations is GPS and communication administrations is SMS, call logs, contacts and
cast screen give guardians when they're remaining with children adjacent at that point they can
observe their portable phone screen specifically on guardians phone. For the most part, has chosen
to work the framework is android to cover all the highlights. The web is utilized for communicating
between the child's side and the parent's side. The Framework can be planned in a straightforward
way. The application was created to create a user-friendly approach on both sides. The reason for
choosing android OS is to target more clients. Parts of people utilizing android versatile phones
these days specify dependent and independent variables in this study.
Here an application will be connected to through two accounts, one for children and another for
parents. Two devices will be connected to each other through two types of accounts. The client will
connect to the server using a GPS network and exchange information. With the Internet connection
the parents will update the children's news via SMS once an hour in the presence of a law
commission whenever the Internet is disconnected. Some more update options have been added to
this application Jalal Unnecessary Advertisement will actually automatically block the value of any
ad-blocker so that children are protected from obscene devotional content and parents can constantly
monitor their children's location through location app tracker option and online. This app has been
3
designed based on the observation of these issues and the current situation. Hopefully this
application will play a big role in avoiding such harmful issues in children and hopefully this
research paper will play a very helpful role in conducting research on this topic in future.
二、研究方法、研究步骤和所需条件:
Research methods: literature research. Find the relevant literature, understand the key points
and steps of Mobile application for Child monitoring and control system, and have a general
understanding of the content of organization design.
2. Research steps: To determine the purpose and problems of the research, the primary
task of literature research is to determine the purpose and problems of the research, and to
make clear whether the literature research method is used as an auxiliary method or an
independent research method in the research project.
3. Required: To determine the purpose and problems of the research, the primary task of
literature research is to determine the purpose and problems of the research, and to make
clear whether the literature research method is used as an auxiliary method or an
independent research method in the research project. Literature collection, to determine the
scope and content of literature collection, in the collection of documents should pay
attention to distinguish the authenticity of documents, and record the source of documents,
standardize the collection of documents. The collation of the literature, the collected
literature is too messy, so it needs to be combed in order to be better used in the research.
4. Describe: There are two stages in the process of literature interpretation. In the first
stage, we strive to browse the literature in a relatively short period of time, the purpose of
which is to locate the literature and facilitate future research and use. The second stage is
accuracy, which defines the real value and significance of the literature and makes a correct
and objective evaluation.
Required conditions: the use of office, Reference’s and other software to improve Child
monitoring and control system.
4
三、研究工作进展计划:
The table below shows a brief description of the project activities through different chapters
against the time schedule as a grant structure.
Chapter5: Conclusion
四、主要参考文献、资料:
[1] Hamid, T (2013) “Online Harassment and Digital Stalking” International Journal of
Computer Applications. [Online].Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.402.8620&rep=rep1&type =pdf
[accessed 8 October 2017].
[2] Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). “How Different are Young
Adults from Older Adults When It Comes to Information Privacy Attitudes and Policies”
Rochester, NY: Social Science Research Network. [Online].Available:
http://papers.ssrn.com/abstract=1589864 [accessed 18 May 2018].
[3] Lundgren, M. (2014). “IS risk practices from a CST perspective: a literature review”.
Master thesis. Luleå University of Technology.
[4] Philips G (2016) ‘7 Ways Your Children Might Bypass Parental Control Software’.
MUO. [Online]. Available: https://www.makeuseof.com/tag/7-ways-children-
mightbypass-parental-control-software/ [accessed 8 May]
[5] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.
5
[6] Sliverman, D. (2000). Analyzing talk and text. In Handbook of qualitative research.
Editors Denzin, N.K. and Lincoln, Y.S., 2nd edition, Sage Publications, California, USA.
pp. 821- 834.
[7] U.S. Dept of Justice (2010) “The national strategy for child exploitation prevention
and interdiction” U.S. Department of Justice [Online]. Available:
https://www.justice.gov/psc/docs/natstrategyreport.pdf [accessed 8 October 2017]
[8] Willard, N. E. (2007). Cyber-safe kids, cyber-savvy teens: Helping young people.
Learn to use the Internet safely and responsibly. John Wiley & Sons.
[9] Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski, I.,
& Stojmenovic, M. (2021). Keeping Children Safe Online with Limited Resources:
Analyzing what is Seen and Heard. IEEE Access, 9, 132723-132732.
[11] Fergus, S. (2018). Internet Safety for Children: Stranger danger, misbehavior and
problems when online.
https://melsatar.blog/2012/03/15/software-development-life-cycle-models-and-
methodologies/#:~:text=Waterfall%20Model,-Description
[12] Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.
6
审核意见:
同意开题
指
导
教
师
意
见 指导教师签名:
年 月 日
分
院
意
见
分院院长(系主任)签名:
年 月 日
7
云南工商学院
毕业论文(设计)答辩许可证
指导教师签字:
年 月 日
毕业设计(论文)指导小组负责人签字:
8
This Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of
Bachelor in Computer science and technology
Graduate School Yunnan Technology and Business University
2022
YTBU. GS. 2022 Bachelor Degree Mobile Application Child monitoring and
control system
9
Abstract
This paper shows how parents may safeguard their children from internet side effects
using the Android application in a very particular sense. The major message of this thesis is
how to use technology to safeguard children from all forms of adverse effects when they are
online. People in today's world are getting to be increasingly subordinate on online-based
gadgets, so we got to be mindful of this as well as the different unsafe situations on the Web
for ourselves and our children. The application has been planned and adjusted around these
issues so that guardians can effortlessly monitor their children remotely through the Android
working framework. This investigate will concentrate on smartphones, and in specific the
Android working system, the reason is that Android phones can be acquired cheaper than an
iPhone, and thus are more likely to be utilized by a child.
10
Acknowledgement
I am pleased to present “Mobile application for Child monitoring and control system”
project and take this opportunity to express my profound gratitude to all those people who
helped me in completion of this project. I thank my college for providing me with excellent
facilities that helped me to complete and present this project. I express my deepest gratitude
towards my project guide for her valuable and timely advice during the various phases in my
project. I count it a special privilege to have her supervise my thesis. My sincere thanks go
to our head of department as well as lecturers in the department and the entire management
for their words of encouragements and support. I would like to thank all my friends for their
smiles and friendship making the college life enjoyable and memorable and family members
who always stood beside of me and provided the utmost important moral support. Finally, I
would like to thank everyone who has helped me directly or indirectly in my project.
11
Table of Contents
Abstract ................................................................................................................................ 10
Acknowledgement ................................................................................................................ 11
Table of Contents ................................................................................................................. 12
CHAPTER 1......................................................................................................................... 16
Introduction ...................................................................................................................... 16
1.1 Research rational ........................................................................................................ 16
1.2 Research Objectives ................................................................................................... 16
1.3 Hypothesis .................................................................................................................. 17
1.4 Scope of research........................................................................................................ 17
1.5 Research contribution ................................................................................................. 17
1.6 Definitions .................................................................................................................. 18
CHAPTER 2......................................................................................................................... 19
Literature Review ............................................................................................................. 19
2.1 Historical background ................................................................................................ 19
2.2 Focus of the problem .................................................................................................. 21
2.2.1 Online risks for children and young people ........................................................ 21
2.2.3 Risky sexual activities ......................................................................................... 22
2.2.4 Pornography and sexual materials....................................................................... 22
2.2.5 Adult sexual predators ......................................................................................... 22
2.2.6 Privacy ................................................................................................................. 23
2.2.7 Sextortion ............................................................................................................ 26
2.2.8 What to do in the event of cyberstalking............................................................. 27
2.3 Concept and Theory ................................................................................................... 28
2.3.1 Mechanisms of online solicitation....................................................................... 29
2.3.2 Web Site Portals .................................................................................................. 29
2.4 Literature Review ....................................................................................................... 30
2.5 Conceptual Framework .............................................................................................. 30
2.6 Modules and Depiction .............................................................................................. 31
CHAPTER 3......................................................................................................................... 32
Methodology .................................................................................................................... 32
3.1 Research design .......................................................................................................... 32
12
3.2 Gantt chart .................................................................................................................. 34
3.3 Project info cycle details ............................................................................................ 35
3.3.1 Waterfallmodel .................................................................................................... 35
3.3.2 Description .......................................................................................................... 35
3.4 Project design ............................................................................................................. 36
3.4.1 E-R Diagram ....................................................................................................... 36
3.4.2 Use case diagram ................................................................................................. 37
3.4.3 Sequence diagram ............................................................................................... 38
3.4.4 Activity Diagram ................................................................................................. 40
3.4.5 Class Diagram ..................................................................................................... 42
3.4.6 Data Flow Diagram ............................................................................................. 43
3.4.7 DFD Symbols ...................................................................................................... 44
3.4.8 Constructing a DFD: ........................................................................................... 45
3.4.9 Salient Features of DFD’s: .................................................................................. 45
3.5 Data Analysis ............................................................................................................. 46
3.5.1 Types of data flow diagrams ............................................................................... 46
3.5.2 Current physical: ................................................................................................. 46
3.5.3 Current logical ..................................................................................................... 46
3.5.4 New logical ......................................................................................................... 46
3.5.5 New physical ....................................................................................................... 46
3.5.6 Rules governing the DFD’s ................................................................................. 46
3.5.7 Data flow ............................................................................................................. 47
3.5.8 Data Flow Diagrams............................................................................................ 48
3.5.9 System Architecture ............................................................................................ 51
3.5.10 Screenshots ........................................................................................................ 53
CHAPTER 4......................................................................................................................... 62
Project Implementation .................................................................................................... 62
4.1 Project Implementation Technology .......................................................................... 62
4.2 Overview of Technologies Used ................................................................................ 63
4.2.1 Introduction to Android ....................................................................................... 63
4.2.2 Project Structure .................................................................................................. 64
4.2.3 The User Interface ............................................................................................... 65
13
4.2.4 Tool Windows ..................................................................................................... 66
4.2.4 Navigation ........................................................................................................... 67
4.2.5 Multiple APK Support ........................................................................................ 68
4.2.6 Code inspections ................................................................................................. 70
4.2.7 Feasibility Report ................................................................................................ 70
4.3. Testing ....................................................................................................................... 73
4.3.1 Levels of Testing ................................................................................................. 73
4.3.2 Coordination Testing ........................................................................................... 74
CHAPTER 5......................................................................................................................... 78
Conclusion........................................................................................................................ 78
References ............................................................................................................................ 79
Appendix .............................................................................................................................. 81
Appendix A: Interview Guide .......................................................................................... 81
Appendix B: Questionnaire .............................................................................................. 83
BIOGRAPHY....................................................................................................................... 85
14
List of Figures
Figure 1: connection design between phone Gps and database ........................................... 33
Figure 2: Gantt chart ............................................................................................................ 34
Figure 3: WaterfallModel ..................................................................................................... 35
Figure 4: E-R Diagram design ............................................................................................. 37
Figure 5: Use Case Diagram of Parent ................................................................................. 37
Figure 6: Use Case Diagram of Child .................................................................................. 38
Figure 7: Sequence Diagram of Parent ................................................................................ 39
Figure 8: Sequence Diagram of Child .................................................................................. 40
Figure 9: Sequence Diagram of Parent ................................................................................ 40
Figure 10: Activity Diagram of Child .................................................................................. 41
Figure 11: Database Detail ................................................................................................... 48
Figure 121 Level 1 DFD ...................................................................................................... 49
Figure 13: 2 Level 2 DFD: Prediction .................................................................................. 50
Figure 14: System Architecture............................................................................................ 51
Figure 15: System Architecture............................................................................................ 52
Figure 16: Login Page .......................................................................................................... 53
Figure 17: Signup page ........................................................................................................ 54
Figure 18: Home Page .......................................................................................................... 55
Figure 19: Call Log Page ..................................................................................................... 56
Figure 20: Activity Check List page .................................................................................... 57
Figure 21: SMS Check List Page ......................................................................................... 58
Figure 22: Tracking Page ..................................................................................................... 59
Figure 23: Cast Screen ......................................................................................................... 60
Figure 24: Browser History List Page .................................................................................. 61
Figure 25: Main_Activity.java ............................................................................................. 66
Figure 26: Performance monitors......................................................................................... 69
Figure 27: Inspection Result Page........................................................................................ 70
15
CHAPTER 1
Introduction
There's a growing demand for smartphones in today's world. Individuals of all ages are
using it easily, beginning with adults. When smartphones are associated with the Web, we
ought to pay attention when it comes to unexpectedly lurch over uncivilized pictures and
how prepared to induce spam emails extending from tricks to fake pharmaceuticals with
completely dishonorable content in fact for adults. And this paragraph has been displayed
with our children in mind. Here's how we are able effectively secure kids from the terrible
side of the Internet with the Android working framework.
16
4. Any malevolent e-mails or any fake phone calls from children to the phone can
actually be alerted to the parent's phone through instant messaging.
1.3 Hypothesis
Children who are characterized as 12 a long time and more energetic who are utilizing
the net are revealed to data not all of it fitting or incredible for them when being so youthful
guardians and gatekeepers have duties to keep them secure from what is disgraceful be that
because it may children as seen inside the cybersafe Ireland 2017 report truly do things on
the web that they do not prompt the gatekeepers or guardians nearly there are parental
controls that are arrangements for the circumstances and the android application may be a
culminating way to clarify this issue. I have attempted to solve this issue with the Android
working framework analyzed in this paper.
17
1.6 Definitions
This research targets to assist guardians who cannot manage to spend time with their
children at home, and who have smart gadgets and Internet connections, to keep kids away
from all the risky things on the internet so that guardians can remotely control and monitor
their children by using android devices, this is the main goal of this thesis.
18
CHAPTER 2
Literature Review
2.1 Historical background
The game spread around the world and over 130 children were contaminated with the
diversion passed on all over the world and their age was 09 to 18 this diversion unconsciously
spread all over the world checking Bangladesh and financial for children and i have chosen
the subject of my proposal child security when children are online regularly an online-based
suicide android diversion called --blue whale challenge-- which the total world was able to
secure but in that case it was as well late for me Wikipedia reports June 2018 the diversion
spread around the world and over 130 children tainted with the diversion passed on all over
the world and their age was 09 to 18 this diversion unwittingly spread all over the world
tallying Bangladesh and China.
Bangladesh:
19
China:
In May 2017, Tencent, China's largest Internet service portal, closed 12 suspicious
Blue Whale-related network groups on its social networking platform QQ. It said that the
number of this kind of group is on the rise. The search results of related keywords were also
blocked. (Information collect from (https://en.wikipedia.org/) I have investigated all these
issues in detail online and I have done this inquiry to solve it individuals in today's world are
using Android devices more since it is available at a reasonable price so kids are presently
using these phones and kids from different online-based stages. Faced with all kinds of
obscenities and dangerous types of fraud and hurtful things, in this manner we ought to think
exceptionally entirely approximately the security of children and we require administration
initiatives to protect them. Keeping children secure online incorporates keeping them
protected from seeing fabric which is reasonable as it were for grown-ups, there's moreover
fabric which is unlawful which children may accidentally experience while surfing the
Internet. We ought to ensure that no conversation ought to develop which is inappropriate
or that improper language is used while a child is on the Web is additionally imperative. In
this case, guardians are attempting to play an active role in ensuring them in today's world
and this application is outlined to assist them through which guardians will be able to screen
and secure their children around the clock.
If parents knew about the benefits of such an application, maybe 130 kids in our
world wouldn't have died when the Blue Whale game was coming. Moreover, this
android application employments GPS and telephony administrations, and GPS offers
assistance in finding the lost child’s area by the overview of lost children in 2004 there add
up to 5996 children are lost suka society Jan 16, 2011, news conclusion out of these as it
were 4092 children return or were found by police be that as it may 1904 children are missed
and the children ages 14 a long time and 17 a long time are missed or ran absent from
domestic the guardians are stressed almost their children by lost the children the guardians
are frightened to go on the family trip there are parts of chances to miss the child on the trip
the venture is created for those guardians that they have stressed to miss their child in
today’s world parts of children have smartphones with the help of smartphones GPS based
following android (Apk) application guardians can observe their children GPS is combined
with GPS-based SIM cards on portable to observe a child’s area the GPS employments
20
longitude and scope to track the area the SMS brief message benefit is utilized to
communicate child side and parent side applications SMS benefit is used when smartphones
don't bolster web network the framework is able to send the child’s smartphones correct
area to the parent's smartphone when the parent request to check the child’s location
Despite the many benefits of the Internet, children and young people – who are
particularly vulnerable due to their age – face a number of risks, including: Inappropriate
content, including age-inappropriate content (such as violent and sexual websites) and
illegal content. Online games such as the Blue Whale Challenge have been used to provoke
young adults to carry out a series of ‘challenges’ – some of which are life threatening – are
particularly harmful; Inappropriate contact, including being the victim of bullying,
grooming, and harassment; Inappropriate conduct, including sexting, self-generated
explicit material that is shared with others, sexual harassment, and the bullying of others.
Such conduct often leads to reputational damage; Commercial issues, including spam,
hidden costs (such as in-app purchases), inappropriate advertising, and data collection
which infringes on children’s rights.
21
2.2.3 Risky sexual activities
Risky sexual exercises include circumstances in which people show security dangers
to young individuals and circumstances in which youthful individuals themselves lock-in
in into behavior that causes concern.
One concern approximately online pornography and other sexual materials are a
coincidental untimely presentation of these materials by more youthful children and
coincidental get to by teens. We will assume that numerous, in the event that not most, high
scholars will be inclined to spend some time looking at online erotica. Typically an issue
that families will handle differently in agreement with their family values. The more critical
issues for all guardians of youngsters are online exercises that go past ordinary sexual
interest to intemperate, addictive get, particularly get too pornographic fabric that includes
viciousness or is child pornography.
Adult sexual predators seduce young people who they contact through public online
communication services with the objective of arranging for a sexual liaison or obtaining
child pornography. Unfortunately, sometimes teens engage in unsafe or irresponsible
behavior that is highly likely to attract the attention of these adult sexual predators. It appears
that some adult sexual predators seek more naïve and innocent young people, whereas others
simply troll for teens who welcome such contacts. We are constantly confronted with
these unpleasant things online and are being cheated on. In addition to this, our
children are exposed to these insecure things and this study has been done to keep
these things away from children and also discuss how to prevent it. I have taken all
of the above issues from my personal online research and have monitored the validity of
each issue through observation and tried to find out how to solve the problem by presenting
the problem to the world through the Android application. In addition to this, the literature
review started by searching for articles, mainly by using Google Scholar and the university’s
library services.
22
2.2.6 Privacy
Privacy is a part of the CIA group of three, however youngsters' security is vital when
online henceforth why a writing search was additionally done regarding this matter.
Acquits, et al., (2015) in their survey express that in the event that this is the period of data,
security is the issue of our times. Interests, characteristics, convictions, and goals that were
once private or imparted to the couple of now leave trails of information that uncovered
them. Clients impart utilizing messages, texts, and web-based entertainment celebrating
infants, and grieve the departed utilizing their online entertainment profiles. Certain
individuals do internet dating and track down accomplices; teach themselves with online
courses; clients look for replies to unremarkable and delicate inquiries; read news also,
books; explore roads with geotracking frameworks. Via completing these and other
exercises, clients uncover data to each other, to business elements and to different
legislatures maybe accidentally. The observing of individual data is pervasive; its capacity
is so strong as to leave your set of experiences and past undeletable. With this speed increase
in information assortment are consistent headways in the capacity to total, examine, and
draw touchy surmising’s from this accumulated information on people. Organizations
furthermore, people can profit from the sharing of information that was once covered up
and through the utilization of more modern investigation to bigger and more interconnected
data sets. The article expresses that society all in all can profit from the sharing of
information what’s more, a model is given of electronic clinical records which are
consolidated to notice novel medication collaborations. There are obviously issues with the
potential for individual information being manhandled for monetary and social segregation,
stowed away impact and control, pressure, or restriction of these are on the whole
unsettling. This disintegration of security can compromise our independence, as shoppers
as well as residents. Sharing more private information does not be guaranteed to constantly
convert into more advancement, productivity, or uniformity. Due to the fast nature of these
turns of events, there has been significant discussion about clients' capacity to explore a
quickly advancing security scene, and the thing to do about protection at an arrangement
level. A trust their own capacity to settle on conclusions about data uncovering and hold
back. Individuals with these perspectives will generally see administrative security of
protection as impeding the progressions of data advances also, the advantages that these
23
innovations might bring. Certain individuals are worried about the capacity of people to
oversee protection in the midst of progressively complex compromises. Individuals feel
they never again have sufficient security involving customary apparatuses for protection
Dynamics like decision and assent. The audit expresses that rather than personal Obligation,
administrative intercession might be expected to adjust the interests of the Subjects of
information against the force of business elements and state-run administrations holding
that information. The survey portrays how individuals deal with the limits between their
private and public internet-based presence in various ways: which incorporate separateness,
hold, or namelessness or by safeguarding individual data and through trickery and
dissimulation. Individual’s layout such limits for some, reasons, including the requirement
for closeness and mental break and the longing for security from social impact and control.
The survey expresses that occasionally these inspirations are so instinctive and basic that
protection looking for arises quickly and normally. This can frequently be the situation
when actual security is barged in on, at different time’s individuals experience impressive
vulnerability about whether, and the amount, they ought to be worried about protection.
Hoofnagle, et al., (2010) composed a paper on how youthful grown-ups vary from more
seasoned grown-ups with regards to data security mentalities and strategies. The age bunch
is marginally more seasoned than the age profile this theory is focused on. As Hoofnagle,
et al., (2010) alludes to media reports with accounts of youngsters transferring scurrilous
photographs and sharing them on the web, youngsters gloating about liquor fueled offenses
on interpersonal interaction locales, and furthermore publicizing different ventures that they
might lament from here on out. These occasions are mixed up as addressing an age-wide
change in mentality toward data protection. Analysts thusly erroneously guarantee that
youngsters are less worried about keeping up with protection than more seasoned
individuals are. As individuals age, they will quite often turn out to be more careful as
alluded to in the report that one mental investigation discovered that teenagers (matured 13-
16) and what they named "adolescents" (those matured 18-22) are more disposed to be
engaged with a hazardous way of behaving and dangerous decision making than 'grown-
ups' are (those more seasoned than24 years). The investigation discovered that companion
impact assumes a significant part in making sense of unsafe conduct during pre-adulthood.
The finding was more articulated among youths than among the adolescents, however,
contrasts among young people and grown-ups were striking in eagerness to face challenges,
24
especially when bunch conduct was involved. The paper makes sense that schooling might
be helpful, however, numerous youthful grown-ups are presented to instructive programs
about the Internet, however, the emphasis is on private wellbeing from online hunters
furthermore, cyberbullying with little accentuation on data security, and protection. The
report infers that youthful grown-up surely are not quite the same as more seasoned grown-
ups with regard to the information on security regulations. Youthful grown-ups are bound
to accept that the law secures them both on the web and off. This absence of information
on security and protection in an enticing climate, as opposed to an absence of concern with
respect to security, might be significant explanation huge quantities of youngsters draw in
with the advanced world in an apparently uninterested way. The only instruction is likely
insufficient for youthful grown-ups to arrive at the right levels of protection. The report
says that youthful grown-ups likely need numerous types of help from different quarters of
society, including the administrative field, to adapt to the complex online flows that intend
to go against their best security impulses. Hanna, et al., (2007) in their article allude to how
each time a client visits a site, a client leaves an electronic follow that can later be recovered
and broken down. Utilizing innovation to store recognizing data, for example, treats, Web
webpage administrators can benefit from this data by combining these profiles with other
segment information. A Violation of 12 security happens when an association, while it is
completing the organization targets, gathers, stores, controls, or sends individual data
obscure to the person. The article in its decision expresses that associations might have the
means to effectively deal with the protection worries of their clients. The outcomes show
that protection arrangements are esteemed by clients. Associations can gain from this by
expressing their security strategy all the more noticeably. The article likewise expresses
that the advantages of expanding comfort are expanded esteem presented through
personalization and bringing down of frictional expenses. It too creates the impression that
comfort likewise has an advantage that has been disregarded, which is alleviating protection
concerns. Monetary motivations are additionally an enticing means to evoke individual
data. The exploration has shown that individuals will uncover individual data for gifts and
so on. Kelsey and McCauley, (2008) allude to a survey completed by the Consumer Reports
Public Research Center showed that American residents are worried about how is being
managed their own data on the web. The report portrays how over a third (35%) in the
survey utilized another email address to try not to give genuine data. More than a quarter
25
(26%) of individuals in the survey have utilized a product arrangement that conceals their
character, and one-quarter have given counterfeit data to access a site (25%). In the survey
the customers knew that data about their riding propensities was being gathered on the web,
however, a considerable lot of them didn't know what organizations can do with this data.
2.2.7 Sextortion
As per Watts, et al (2016) there is, lawfully talking, no such thing as sextortion. The
word is a benevolent a legal shoptalk for a class of clearly criminal lead that as a general rule
compares flawlessly with no known criminal offense. Sextortion cases are in some cases
arraigned under youngster erotic entertainment regulations, once in a while as PC
interruptions, in some cases as following. Watts, et al. (2016) portray it as sextortion which
is essentially equivalent to antiquated coercion or extortion, completed over a PC network,
including a danger to the person in question, for the most part yet not dependably to
physically deliver express pictures of the person in question, assuming the casualty will not
participate in that frame of mind of further sexual action. Watts, et al. (2016) completed an
examination of a sum of 78 cases, in 52 various wards, 29 states or domains, and three far
off nations. 55 of those cases (71%) include just minor casualties. An extra 14 (18 percent),
by contrast, include a blend of both minor casualties and grown-up casualties, in nine cases
(12 percent), every one of the recognized casualties were grown-ups. We can see countless
occurrences with minors. . (2016) did an investigation of a sum of 78 cases, in 52 various
purviews, 29 states or regions, and three outside nations. 55 of those cases (71%) include
just minor casualties. An extra 14 (18 percent), by contrast, include a blend of both minor
casualties and grown-up casualties, in nine cases (12 percent), every one of the distinguished
casualties was grown-up. We can see countless occurrences with minors. (Wittes, et al.
(2016) on page 8 give the following stats on their results for Sextortion:)
• The results showed that in 78 percent of the incidents, they involved female
children and 12 percent involved male children (In 10 percent of incidents,
child gender could not be determined);
• The results showed that in 78 percent of the incidents, they involved female
children and 12 percent involved male children (In 10 percent of incidents,
child gender could not be determined);
26
• The results showed that in 22 percent of cases, the reporter doing the report
mentioned that they were suspicious of, or knowing that, multiple children were
targeted by the same offender.
Wittes, et al. (2016) state that based on the information known by the CyberTipline reporter,
sextortion appears to have occurred with one of three primary objectives (however in 12
percent of reports, CyberTipline were unable to determine the objective)
• Wittes, et al. (2016) state that based on the information known by the
CyberTipline reporter, sextortion appears to have occurred with one of three
primary objectives (however in 12 percent of reports, CyberTipline were unable
to determine the objective)
• The perpetrator wished to get money from the child (6 percent);
• The perpetrator wanted to have sex with the child (6 percent).
Hamid (2013) prescribes that in case cyberstalking happens, the casualty spares all of
the communication prove, without changing or altering, for future reference. On the off
chance that your Email has the office for Mail sifting, the casualty ought to caution the
stalker to halt and 18 then square him/her. In the event that the stalking proceeds, employing
a diverse e-mail address, the casualty should consider reaching the Web Administrations
Supplier (ISP) and report the occurrence to a law firm and a cyberstalking helpline. In the
event that the online fabric shows up to show a legitimate inescapable risk of savagery and
threat to others, contact the police, and initiate a defensive reaction from the police.
27
The taking after are common rules for cyberstalking security. Evaluate what online
information exists almost you utilizing Web look motors like Google; alter your email and
passwords as often as possible for critical and regularly utilized online accounts and keep
them secure; survey all security and security settings in your computing gadget; maintain a
strategic distance from open forums; restrain what you share on the Web particularly
individual data, photographs, videos. Teach your companions, family and work colleagues;
accumulate prove once you discover it; report to police; look for offer assistance and bolster
from charities like wrongdoing victims’ helpline. To resolve a cyberstalking issue may
moreover incorporate a mechanical arrangement, for illustration parental control settings or
extraordinary parental control program, which offer assistance guardians to channel Emails
and chat rooms, square undesirable messages and messages gotten from obscure sources,
web sifting can too be used to confine get to a few destructive web destinations.
Mysterious remailers and browsers assist diminish the probability of potential stalkers being
able to recognize casualties. A few stalkers acting as programmers to abuse working
frameworks and program applications vulnerabilities, can introduce spyware and other
checking software to take after the casualty. Hamid (2013) states that Organize Security
Arranging Engineering (Net SPA) and other attack charts and vulnerabilities scanners can
offer assistance settle these sorts of issues by applying special patches which now not permit
assailants to get to other computers. A few stalkers, use IP Scanners programs which are
unreservedly accessible on the Web, to check a run of IP addresses for open ports or back
entryways to misuse and pick up get to the child’s computers for observing and following.
There are numerous specialized fixes to illuminate these assaults, for example utilizing NAT
and PAT, mapping open IP addresses to a run of private ones.
28
This exploration will focus on cell phones, and specifically the Android working framework,
the explanation is that Android telephones can be bought less expensive than an iPhone, and
accordingly are bound to be utilized by a child. A designer's rendition of Android can
likewise be arranged to run it in a virtual machine running on a PC which makes different
testing conceivable. The theory will likewise include looking into other association's
exploration and discoveries and how it thinks about to my own examination. The postulation
will offer guidance on the best way to push ahead corresponding to guarding child on the
web.
29
likewise be developed for nothing, requiring just approval, a free username, and a secret
phrase from the supporting Web webpage gateway (FreWebspac Directory, n.d.). Assuming
a hunter determines the account name of a designated youngster (by means of talk, for
example), it is not difficult to decide if the kid has posted any extra private data on the Web
website entryway. This data, thusly, may be utilized as a way to work with correspondence
with youth through trickery by guaranteeing comparative interests (Walk et al., 2003).
(Dombrowski, S. C., Lemony, J. W., Aria, C. E., & Dickson, S. A. (2004). Protecting children
from online sexual predators: technological, psych educational, and legal
considerations. Professional Psychology: Research and Practice, 35(1), 65.)
30
2.6 Modules and Depiction
The system comprises 2 major modules with their sub-modules as follows:
01. Parent:
a. Register: Parents need to register themselves by filling up basic
registration details and by creating valid login
b. Login: After successful registration, parents need to log in using their valid
login credentials.
c. Include/ View Child Details: Once the parent is logged into the
application, he/she can include their children's subtle elements. The
parent can see their included children.
d. View: Once the child's subtle elements are included, a parent can see
different points of interest from the child’s smartphone as takes after:
i. Call Logs: This shows all the later call logs from the child’s
smartphone.
ii. Messages: This shows all the messages from the child’s
smartphone.
iii. Location: This shows the area of the child’s smartphone.
iv. Contacts: Displays all the contact from the child’s smartphone.
v. Cast Screen: Parents can see children Phone screen when there
nearby
02. Child:
a. Login: Registered children need to log in using valid login credentials.
b. Use Calculator: After successful login, a fully functional calculator will be
displayed which can be used by the child itself.
31
CHAPTER 3
Methodology
The nature of the issue in a ponder coordinates the choices of strategies. This think
addresses issues that can happen on the Web for children and ways to moderate such
violations of security. This implies that the think about looks for data related to peoples’
interpretations of diverse circumstances, hence the experimental information is subjective
(Seale and Silverman, 1997). Related to this approach is the impediment of expansive test
information collection as is anticipated in quantitative thinks. All things considered, when
the exertion is to get its activities, discernments, demeanors, and so on a subjective approach
is prescribed (Seale and Silverman, 1997). Ponders that make an exertion to have an impact
on hone are common in data systems investigation (Baskerville and Myers, 2004). Moreover,
a practice-based approach has been investigated to contribute to data security (Lundgren,
2014). Activity research may be a strategy that's straightforwardly pointing to understanding
and tackling commonsense issues, simultaneously moreover contributing to the logical body
of information (Baskerville and Myers, 2004). Activity inquiry about builds upon beginning
with distinguishing the social circumstance or issue, and moment, bringing almost a
collaborative to alter (Baskerville and Myers, 2004). This proposition applies the
fundamental rationale for such a technique, whereas may not be completely taken after the
activity investigates two-step preparation. The exercises to gather data for this think have
been by doing a writing audit, completing a survey, and performing interviews. Moreover, a
Web look and possess experimenting with the program has been utilized to pick up
information on almost the chosen subject.
32
Framework can be planned in a straightforward way. The application was created to create
a user-friendly approach on both sides.
The architecture consists of two sides. To begin with is a parent side and another is a child
side. The parent side acts as the server and the child side acts as the client. Basically, there
are two android phones one is on the child's side and the other is on the parent's side. The
parent’s side uses an android application service for communicating to the child’s mobile
and with the help of the mapping parent used to view the child’s location on the map. That’s
why it employments internet and communication services to empower at parent side to track
the child’s area. On the child’s side, another android phone supports GPS and other
telephonic facilities. The child side uses an android application to communicate with the
33
parent side. The child needs to log in using an android application and after successful login,
a fully functional application will be displayed to the child to operate. On the child side,
location services that are GPS are empowered and running on the child side. And parent side
uses internet connectivity to view the child’s location on the map. At parent, side
requirements are mapped for tracking and service (listener) for listening to messages coming
from the child’s side. On the child’s side listener service always runs in the background, at
the parent side used to send commands for location, message, call logs, and contact list from
the child’s smartphone.
34
3.3 Project info cycle details
Figure 3: WaterfallModel
3.3.2 Description
The Waterfall Model could be a direct consecutive stream. In which advance is seen
as streaming relentlessly downwards (like a waterfall) through the stages of software
implementation. This implies that any stage within the improvement handle starts as it were
on the off chance that the previous stage is total. The Waterfall approach does not
characterize the method to go back to the last stage to handle changes in prerequisites. The
Information cycle approach is the most punctual approach that was utilized for computer
program advancement.
35
3.4 Project design
36
Figure 4: E-R Diagram design
37
3.4.3 Sequence diagram
38
Figure 7: Sequence Diagram of Parent
39
Figure 8: Sequence Diagram of Child
40
Figure 10: Activity Diagram of Child
41
3.4.5 Class Diagram
New Registration
PARENT
- Login id : String
- Name : String
- Password : String
- DOB : Int
- Gender : String
+ Login ()
- Address : String
+ btn_Click ()
- Mobile No.: Int
+ Logout ()
- Email id : String
- Id : String
- Password : String
+ Submit ()
+ Login ()
+ btn_Click ()
+ btn_Click ()
+ Logout ()
42
3.4.6 Data Flow Diagram
A data flow diagram is a graphical device utilized to depict and analyze the
development of information through a framework. These are the central instrument and the
premise from which the other components are created. The change of information from input
to yield, through handled, maybe portrayed coherently and autonomously by physical
components related to the framework. These are known as coherent information stream
graphs. The physical information stream graphs appear to be the genuine actualizes and
development of information between individuals, divisions, and workstations. A full
description of a framework really comprises a set of information stream graphs. Utilizing
two commonplace documents, Yourdon, Gene, and Sarsen’s documentation creates the
information stream graphs. Each component in a DFD is labelled with an expressive title.
Prepare is encouraged, distinguished with a number that will be utilized for a recognizable
proof reason. The improvement of DFDs is tired a few levels. Each preparation in lower-
level charts can be broken down into a more point by point DFD within the following level.
The lop-level graph is regularly called the setting chart. It comprises a single prepared bit,
which plays a crucial part in considering the current framework. The method within the
setting level diagram is detonated into other preparations at the primary level DFD. The
thought behind the blast of a handle into more preparation is that understanding at one level
of detail is detonated into more noteworthy detail at another level. It was typically done until
an assist blast is vital and a satisfactory sum of detail is portrayed for the investigator to get
it the process. Larry Constantine, to begin with, created the DFD as a way of communicating
framework prerequisites in a graphical form. This led to the measured plan. A DFD,
additionally known as a "bubble chart", has the reason of clarifying framework prerequisites
and recognizing major changes that will end up programs in the framework plan. So, it is the
beginning point of the plan to the least level of detail. A DFD comprises an arrangement of
bubbles joined by information streams within the framework.
43
3.4.7 DFD Symbols
Data flow
Data Store
44
3.4.8 Constructing a DFD:
Several rules of thumb are used in drawing DFDs:
1. Process should be named and numbered for easy reference. Each name should be
representative of the process.
2. The flow direction is from top to bottom and from left to right. Data traditionally
flow from the source to the destination, although they may flow back to the original. One
way to indicate this is to draw a long flow line back to ahead. An alternative method is to
repeat the source symbol as a destination. Since it is used more than once in the DFD, it is
marked with a short diagonal.
4. The names of data stores and destinations are written in capital letters. Process and
dataflow names have the first letter of each word capitalized
A DFD typically shows the minimum contents of the data store. Each data store should
contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out. Missing interfaces
redundancies and like are then accounted for often through interviews.
1. The DFD shows a progression of information, not control circles, and choices are
controlled contemplations that don't show up on a DFD.
2. The DFD doesn't show the time factor associated with any interaction, whether the
information streams happen day to day, week by week, month to month, or yearly.
45
3.5 Data Analysis
3.5.1 Types of data flow diagrams
1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
3.5.2 Current physical:
In Current Physical DFD, process marks incorporate the name of individuals or their
positions or the names of PC frameworks that could give a portion of the general framework
handling names, including recognizing the innovation used to deal with the information.
Likewise, information streams and stores are frequently marked with the names of the real
actual media on which information is put away, for example, document envelopes, PC
records, business structures, or PC tapes.
3.5.3 Current logical
The actual parts of the framework are taken out however much as could reasonably be
expected. This framework is diminished to quintessence to the information and the
processors change them paying little heed to real actual structure.
This is actually similar to a present legitimate model; on the off chance that the client
was totally content with the usefulness of this framework yet disapproved of the way things
were carried out, commonly, the new sensible model will contrast with this coherent model
while having extra capacities, outright capacity evacuation and wasteful streams perceived.
The modern physical speak to as it were the physical execution of the modern
framework.
46
2) No preparation can have as its input. In case a question has as it were inputs, at that
point, it must be a sink.
Data store
1) Data can't move straightforwardly starting with one information store then onto the
next information store; a cycle should move information.
2) Data can't move straightforwardly from an external source to an information store, a cycle
that gets, should move information from the source and spot the information into the data
store
Source or Sink
The beginning and/or objective of information.
1) Data can't move critically from a source to sink it should be moved by cycle
1) A Data Flow has just a single course of stream between images. It might stream in the
two bearings between a cycle and an information store to show a read before an update. The
last option is generally demonstrated, be that as it may, by two separate bolts since these occur
at an alternate kind.
2) A participant in DFD implies that the very same information comes from any of at least
two unique cycles of information put away or sank to a typical area.
47
3.5.8 Data Flow Diagrams
48
Figure 121 Level 1 DFD
49
Figure 13: 2 Level 2 DFD: Prediction
50
3.5.9 System Architecture
51
Figure 15: System Architecture
52
3.5.10 Screenshots
53
Figure 17: Signup page
54
Figure 18: Home Page
55
Figure 19: Call Log Page
56
Figure 20: Activity Check List page
57
Figure 21: SMS Check List Page
58
Figure 22: Tracking Page
59
Figure 23: Cast Screen
60
Figure 24: Browser History List Page
61
CHAPTER 4
Project Implementation
4.1 Project Implementation Technology
The Extend application is stacked in Android Studio. We used Android Studio for the
Plan and coding of the venture. Made and kept up all databases in SQL Server 2008, in which
we made tables and composed the inquiry for putting away information or records of the
project.
Hardware Requirement
Software Requirement:
1. Laptop or PC
➢ Windows 7 or higher.
➢ SQL Server 2008
➢ Java
➢ Android Studio
2. Android Phone or Tablet
62
4.2 Overview of Technologies Used
4.2.1 Introduction to Android
• A brought together climate where you can create for all Android gadgets
• Moment Run to push changes to your running application without building another
APK
• Code layouts and GitHub mix to assist you with building normal application
elements and import test code
63
4.2.2 Project Structure
Each task in Android Studio contains at least one module with source code documents
and asset records. Sorts of modules include:
• Library modules
By default, Android Studio shows your task documents in the Android project view, as
displayed Image. This view is coordinated by modules to give speedy admittance to
your undertaking's key source documents.
64
All the form records are apparent at the high level under Gridley Scripts and each
application module contains the accompanying organizers:
• Java: Contains the Java source code records, including JUnit test code.
•res: Contains all non-code assets, for example, XML designs, UI strings, and bitmap
pictures.
The Android project structure on disk contrasts with this straightened representation.
To see the real file structure of the Venture, select Extend from the Venture dropdown (in
figure 1, it's appearing as Android). You can to customize the see of the extend records to
center on particular viewpoints of your app improvement. For case, selecting the Issues see
of your Venture shows joins to the source records containing any recognized coding and
sentence structure blunders, such as a lost XML component closing tag in a layout file.
2. The route bar assists you with exploring your venture and opens records for altering.
Furthermore, it gives a smaller perspective on the design apparent in the Project window.
3. The manager window is the place where you make and alter code. Contingent upon the
present document type, the editorial manager can change. For instance, while reviewing a
formatted document, the proofreader shows the Layout Editor.
4. The instrument window bar goes around beyond the IDE window and contains the buttons
that permit you to grow or implode individual device windows.
5. The device windows give you admittance to explicit errands like undertaking the board,
search, and form control, and that's only the tip of the iceberg. You can extend them and
breakdown them down.
65
6. The status bar shows the situation with your venture and the IDE itself, and any
admonitions or messages.
You'll be able to organize the most window to grant yourself more screen space by
covering up or moving toolbars and apparatus windows. You'll moreover utilize console
accessible routes to get to most IDE features. For example, you can look over your source
code, databases, and activities, components of the user interface, and so on by double-
pressing the Move key or clicking the amplifying glass within the upper right-hand corner
of the Android Studio window. This will be exceptionally valuable if, for illustration, you're
attempting to find a specific IDE activity and have overlooked how to trigger it.
Rather than using pre-set points of view, Android Studio takes after your setting and
naturally brings up significant instrument windows as you work. By default, the foremost
66
commonly utilized instrument windows are stuck to the apparatus window bar at the edges
of the application window.
• To grow or implode an instrument window, click the apparatus' name in the device
window bar. You can likewise drag, pin, unfasten, join, and separate apparatus
windows.
• To get back to the present default device window format, click Window > Restore
Default Layout or alter your default design by clicking Window > Store Current
Layout as Default.
• To show or conceal the whole device window bar, click the window symbol in the
base left-hand corner of the Android Studio window.
• To find a particular device window, drift over the window symbol and select the
apparatus window from the menu.
4.2.4 Navigation
Here are a few hints to assist you with moving around Android Studio.
• Switch between you’re as of late gotten to records utilizing the Recent Files activity.
Press Control+E (Command+E on a Mac) to raise the Recent Files activity. Of
course, the last gotten to record is chosen. You can likewise get to any instrument
window through the left segment in this activity.
• View the design of the present document utilizing the File Structure-activity. Raise
the File Structure-activity by squeezing Control+F12 (Command+F12 on a Mac).
Utilizing this activity, you can rapidly explore to any piece of your present record.
• Look for and explore to a particular class in your venture utilizing the Navigate to
Class activity. Raise the activity by squeezing Control+N (Command+O on a Mac).
Explore to Class upholds complex articulations, including camel bumps, ways, line
explore to, center name coordinating, and so forth. Assuming you call it two times in
succession, it shows you the consequences of the undertaking classes.
• Explore to a document or envelope utilizing the Navigate to file activity. Raise the
Navigate to file activity by squeezing Control+Shift+N (Command+Shift+O on a
67
Mac). To look for organizers instead of records, add a/toward the finish of your
demeanor.
• Explore to a technique or field by name utilizing the Navigate to Symbol activity.
Raise the Navigate to Symbol activity by squeezing Control+Shift+Alt+N
(Command+Shift+Alt+O on a Mac).
• Observe every one of the bits of code referring to the class, technique, field,
boundary, or explanation at the present cursor position by squeezing Alt+F7
• Android Studio involves Griddle as the groundwork of the form framework, with
more Android-explicit capacities gave by the Android module to Griddle. This form
framework runs as an incorporated device from the Android Studio menu and freely
from the order line. You can utilize the elements of the form framework to do the
accompanying:
• Alter, design, and broaden the form cycle.
• Make various APKs for your application with various elements utilizing similar
ventures and modules.
• Reuse code and assets across source sets.
By utilizing the adaptability of Griddle, you can accomplish all of this without
adjusting your application's center source records. Android Studio assembles records are
named construct. Gridley. They are plain text records that utilize Groovy punctuation to
design the form with components given by the Android module to Gridley. Each venture has
one high-level form record for the whole task and separate module-level form documents for
every module. Android Studio consequently produces the essential form records when you
import a current task.
Various APK support permits you to make different APKs in light of screen thickness or ABI
proficiently. For instance, you can make separate APKs of an application for the hdpi and mdpi
screen densities while as yet thinking of them as a solitary variation and permitting them to share test
APK, java, dx, and ProGuard settings.
68
Troubleshoot and Profile Tools
Android Studio helps you in troubleshooting and working on the exhibition of your code, including
inline investigating and execution examination apparatuses. Inline troubleshooting
Use inline troubleshooting to upgrade your code walk-throughs in the debugger view with an inline
check of references, articulations, and variable qualities. Inline investigate data incorporates:
Tooltip values
Android Studio gives performance monitors to more effectively track your app's memory
and CPU utilization, discover deal located objects, find memory spills, optimize graphics
performance, and dissect arranged demands. Along with your app running on a gadget or
emulator, open the Android Screen apparatus window, and after that, tap the Screens tab.
69
Allocation tracker
Android Studio permits you to track memory assignment because it screens memory
utilize. Following memory allotment will empower you to observe where objects are
distributed when performing particular activities. Knowing these allotments lets, you
optimize your app’s execution and memory utilize by altering the strategy calls related to
those activities.
At whatever point you compile your program, Android Studio naturally runs arranged
Buildup and other IDE assessments to assist you in rapidly recognizing and redressing issues
with the basic quality of your code. The Build-up instrument checks your Android venture
source records for potential bugs and optimization enhancements for rightness, security,
execution, ease of use, availability, and internationalization.
A possibility ponder may be a high-level capsule version of the whole handle planning
to reply a few questions: What is the issue? Is there any attainable arrangement to the given
circumstance? Is the issue indeed worth understanding? An achievability ponder is
conducted once the issue is clearly caught on. A possibility consider is vital to decide that
70
the proposed framework is Attainable by considering the specialized, Operational, and
financial variables. The administration will have a clear-cut see of the proposed framework
by having a natty gritty possibility study. The taking after feasibilities is considered for the
venture to guarantee that the venture is variable and does not have any major hindrances. A
possibility think about includes the taking after things:
➢ Technical Feasibility
➢ Economic Feasibility
➢ Operational Feasibility
In this stage, we ponder the possibility of all proposed frameworks, and choose the
finest attainable arrangement for the issue. The achievability is examined based on three
fundamental variables as takes after.
Technical Feasibility
In this step, we confirm whether the proposed frameworks are in fact attainable or not.
i.e., all the innovations required to create the framework are accessible promptly or not.
Technical Possibility decides whether the organization has the innovation and aptitudes
essential to carry out the extended and how this ought to be gotten. The framework can be
doable since of the taking after grounds:
Our undertaking is actually achievable in light of the fact that all the innovation required for
our venture is promptly accessible.
Working System: Windows 7(For PC) and Android v5.0 or on the other hand Higher (For
Android Devices)
Dialects:
JAVA
71
Data set System: MS-SQL Server 2008
Documentation Tool:
MS - Word 2013
Economic Feasibility
In this progression, I confirm which proposition is more efficient. I think about the
monetary advantages of the new framework with the venture. The new framework is
monetarily attainable when there are more economic benefits than the speculations and uses.
Economic Feasibility decides if the task objective can be inside as far as possible allotted to
it or not. It should determine if it is beneficial to handle the whole venture or whether the
advantages got from the new framework are not worth the expenses. Economic benefits
should be equivalent to or surpass the costs. In this issue, we ought to consider:
Our project is economically feasible because the cost of development is very minimal
compared to the application's financial benefits.
Operational Feasibility
In this progression, we confirm different functional variables of the proposed
frameworks like labor, time and so on; whichever arrangement utilizes less applicable assets
is the best functionally plausible arrangement. The agreement ought to likewise be
functionally conceivable to carry out. Functional Feasibility decides whether the proposed
framework fulfilled client targets and could be fitted into the ongoing framework activity.
• The clients acknowledge the strategies for handling and showing since they
can meet all client necessities.
• The clients have been associated with the preparation and advancement of the
framework.
• The proposed framework won't bring on any issue for any reason.
72
Our task is functionally doable because the time prerequisites and faculty necessities
are fulfilled. We are a group of four individuals, and we dealt with this venture for three
working months.
4.3. Testing
As the project is on a bit expansive scale, I continuously require testing to create it
fruitful. In case each component works appropriately and gives the wanted yield for all kinds
of inputs, at that point, extension is said to be effective. So, the conclusion is to make the
venture effective, it must be tested. The testing done here was Framework Testing checking
whether the client prerequisites were fulfilled. The code for the modern framework has been
composed utilizing JAVA as the coding dialect and Android Studio as the interface for front-
end planning as the interface for front-end designing. The new framework has been tried
well with the assistance of the clients, and all the applications have been confirmed from
each nook and corner of the user. Although a few applications were wrong, these
applications have been adjusted sometime recently, being actualized. The stream of the
shapes is exceptionally much in understanding with the genuine stream of data.
In arrange to reveal the errors and display completely different stages, we have the
concept of levels of testing. The fundamental levels of testing are:
73
Code Unit Testing
A progression of Testing has finished the proposed framework before the framework
is prepared for the client acknowledgment testing. The means engaged with Testing are:
• Unit Testing
Unit testing centers confirmation endeavors around the littlest unit of the product plan,
the module. This is otherwise called "Module Testing." The modules are tried independently,
and this Testing is done during the programming stage. In this Testing, every module is
viewed as working sufficiently concerning the module's typical result.
Information can be earned across a point of interaction; one module can have
unfavorable endeavors on another. Reconciliation testing is deliberately trying to develop
the program structure while simultaneously leading tests to uncover blunders related to the
point of interaction. The goal is to take unit tried modules and assemble a program structure.
Every one of the modules is joined and tried overall. Here the remedy is troublesome because
the confinement of cause is convolute by the massive cost of the whole program. In this
manner, in the mix testing stop, every one of the mistakes revealed is remedied for the text
testing steps.
Framework testing
Framework testing is the phase of execution that is pointed toward guaranteeing that
the framework works precisely and effectively for live activity starts. Testing is imperative
to the outcome of the framework. Framework testing makes a legitimate presumption that if
every one of the pieces of the framework is correct, the objective will be effectively
accomplished.
Approval Testing
At the finish of coordination testing, programming is collected as a bundle,
communication blunders have been revealed and revised, the last series of programming
tests start, and the approval test starts. Approval tests can be characterized in numerous ways.
However, the straightforward definition is that approval succeeds when the product works
74
in a way that the client can sensibly expect. After the approval test has been directed, one of
two potential circumstances exists.
One is the capacity or execution attributes affirm to details and are acknowledged, and the
other is a deviation from determination revealed, and an inadequacy list is made. The
proposed framework viable has been tried by utilizing approval testing and is viewed as
working agreeably.
Yield Testing
After performing approval testing, the following stage yields trying the proposed
framework since no framework could be valuable if it doesn't create the expected result in
the predetermined configuration. Getting some information about the organization they
expected tests the results produced by the framework viable. Here the resulting design is
considered in two ways, one is on the screen, and the other is the printed design. The resulting
design on the screen is viewed as right as the arrangement was planned in the framework
planned stage as indicated by the client's needs.
For the printed copy, the result comes as the predefined necessities by the clients.
Consequently, yield testing results in no rectifications in the framework.
Test Cases
User Login/Registration: To start with login, users must enroll by filling up essential
registration points of interest. There are different areas on enrollment page, and each field
needs to fill by the client, and the client cannot utilize characters within the login id field.
Admin Login: - Admin login id and watchword is kept obligatory areas, and in case the
admin id or secret word doesn't coordinate at that point, it'll appear as a mistake message.
75
Validation Criteria
1. In each structure, no field which isn't invalid capable ought to be left clear.
2. All numeric fields ought to be checked for non-numeric qualities. Also, text
fields like names shouldn't contain any numeric characters.
3. All essential keys should be naturally created to keep the client from entering
any current key.
4. Utilize mistakes for each Save, Edit, erase, and other significant activities.
5. When the client Tabs out or Enter from a message box, the information ought to
be approved, and on the off chance that it is invalid, the center ought to again be
shipped off the message box with a legitimate message.
Advantages of Project
• Parent might follow youngster utilizing their different android application
accommodated the parent.
• Parent could follow the area and get all the call logs, messages and contact list from
the youngster's cell phone.
• Application naturally works area demands without client association because kids do
not have information to refresh their area on the map. The framework requires area and
communication administrations. The third benefit is that it very well may be utilized inside
where GPS satellites network isn't accessible. Around then, it can use a network that
accommodates area administrations.
• Network offer support utilizes cell ID, for example, IMEI number for the area
following. In conclusion, every one of the controls is on the parent side, and the kid side has
less control access.
Limitations
• Consider any framework that generally enjoys benefits and drawbacks too. The
application has specific restrictions that can be survived. The application doesn't function
admirably when there is no organization free. The application bombs the particular area.
76
However, the application stores the last place, which can be put away at the information base
server. Whenever versatility is turned off, we think about this as one of the disadvantages of
the framework.
• Framework will give incorrect outcomes if the information is not entered accurately.
Features
1) Load Balancing:
Since the framework will be accessible, just the administrator signs in how much
burden on the server will be restricted to the time frame of administrator access.
2) Easy Accessibility:
Records can be effectively gotten to and stored and other data separately.
3) User Friendly:
The Website will give an exceptionally easy to understand approach for all clients.
Keeping up with the generally gotten and data set on the server which will be available
concurring the client necessity with practically no upkeep cost will be exceptionally
proficient when contrasted with putting away all the client information on the accounting
sheet or in actually in the record books.
5) Easy support:
77
CHAPTER 5
Conclusion
In conclusion, the project was designed for children to monitor and control online side
effects. This project was given depth information about the child tracking system with the
help of four components such as GPS, telephony services, adult content blocked
automatically by Ad-Blocker, and cast screen control option the application is built-in.
Finally, this application has room for enhancement. Crisis cautions such elements can be
added to the upgrade of the framework. The proposed framework will be worked on in later
work. This is my project of System Design about the “Android based children safety and
control” application based on Java. I think this system gave a lot of satisfaction to all of us.
However, every undertaking is never supposed to be exceptional in this advancement field.
Considerably more remarkable improvement might be conceivable in this application. We
advanced countless things and acquired a ton of information about the improvement field.
We hope this will prove fruitful for us.
78
References
2. Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). “How Different are Young Adults
from Older Adults When it Comes to Information Privacy Attitudes and Policies” Rochester,
NY: Social Science Research Network.[Online].Available:
http://papers.ssrn.com/abstract=1589864 [accessed 18 May 2018].
3. Lundgren, M. (2014). “IS risk practices from a CST perspective: a literature review”.
Master thesis. Luleå University of Technology.
4. Philips G (2016) ‘7 Ways Your Children Might Bypass Parental Control Software’. MUO.
[Online]. Available: https://www.makeuseof.com/tag/7-ways-children-mightbypass-
parental-control-software/ [accessed 8 May
79
7. U.S. Dept of Justice (2010) “The national strategy for child exploitation prevention and
interdiction” U.S. Department of Justice [Online]. Available:
https://www.justice.gov/psc/docs/natstrategyreport.pdf [accessed 8 October 2017]
9. Learn to use the Internet safely and responsibly. John Wiley & Sons.
10. Jevremovic, A., Veinovic, M., Cabarkapa, M., Krstic, M., Chorbev, I., Dimitrovski, I.,
& Stojmenovic, M. (2021). Keeping Children Safe Online with Limited Resources:
Analyzing what is seen and heard. IEEE Access, 9, 132723-132732.
12. Fergus, S. (2018). Internet Safety for Children: Stranger danger, misbehavior and
problems when online.
13. Seale, C., Silverman, D. (1997). “Ensuring rigour in qualitative research”. European
Journal of Public Health, no 7: 379-384.
https://melsatar.blog/2012/03/15/software-development-life-cycle-models-and-
methodologies/#:~:text=Waterfall%20Model,-Description
80
Appendix
Appendix A: Interview Guide
1 Did you talk to your child about online safety Gender Female= 24
and have you discussed it in the last year?
Male =15
Age 25-29
No
Highest Tertiary
Qualification
Age 25 – 29
Basically they watch YouTube and play
online platform games
Highest Secondary level
Qualification
81
Age 25-29
Male =15
Age 25-29
Yes
Highest Tertiary
Qualification
Note: These questions that require some thinking from the participant. These questions are
based on the answers already given and allow for further exploration and discussion on
topics including
Age 25-29
No
Highest Tertiary
Qualification
82
2 Gender Female= 10
4 What does the adult believe are the potential Gender Female= 31
problems children may encounter?
Male =15
Age 25-29
Yes of course
Highest Tertiary
Qualification
Appendix B: Questionnaire
83
1 Is your child less than 13 Gender Female= 24
years?
Male =15
No Age 25-29
Highest Tertiary
Qualification
2 Gender Female= 10
84
Highest Tertiary
Qualification
BIOGRAPHY
85
Date of Birth: October-25, 1997
Education Background
Work Experiences
86